First-order effects of hypothesized fault conditions are determined by propagating discrete test packets between select nodes and noting the change of path, if any, taken by the test packet under each condition relative to the fault-free path. Tools are provided to create classes of node pairs of interest, and test packets are created only for select classes. The network is analyzed to identify fault conditions that are likely to impact system performance, and only these fault conditions are simulated. By providing a methodology for selecting classes of node pairs to test, and prioritizing the faults to simulate, a first-order survivability analysis of large networks can be performed efficiently and effectively. The efficiency of this technique is also enhanced by providing test packets that are representative of a wide range of possible source-destination combinations, and by evaluating only the source-destination combinations that may be directly affected by each fault condition.
|
39. A non-transitory computer readable medium upon which is stored a computer program that causes a computer system to:
identify a set of source-destination pairs of a modeled network,
create a plurality of test packets, each test packet corresponding to a source-destination pair of the set of source-destination pairs,
simulate propagation of each test packet from source to destination of the corresponding source-destination pair to determine a fault-free routing path,
identify a set of fault conditions to model on the modeled network,
simulate each fault condition to determine if any new paths for the set of source-destination pairs is caused by the fault condition,
determine one or more performance measures corresponding to each new path, and
provide one or more reports based on the performance measures of the new paths.
1. A method comprising:
identifying, on a network analysis machine, a set of source-destination pairs of a modeled network,
creating, on the network analysis machine, a plurality of test packets, each test packet corresponding to a source-destination pair of the set of source-destination pairs,
simulating, on the network analysis machine, propagation of each test packet from source to destination of the corresponding source-destination pair to determine a fault-free routing path,
identifying, on the network analysis machine, a set of fault conditions to model on the modeled network,
simulating, on the network analysis machine, each fault condition to determine if any new paths for the set of source-destination pairs is caused by the fault condition,
determining, on the network analysis machine, one or more performance measures corresponding to each new path, and
providing, on the network analysis machine, one or more reports based on the performance measures of the new paths.
20. A system comprising:
a pair generator that is configured to identify a set of source-destination pairs of a modeled network,
a test packet generator that is configured to create a plurality of test packets, each test packet corresponding to a source-destination pair of the set of source-destination pairs,
a simulator that is configured to simulate propagation of each test packet from source to destination of the corresponding source-destination pair to determine a fault-free routing path,
a fault condition generator that is configured to identify a set of fault conditions to model on the modeled network, and
a report generator,
wherein
the simulator is configured to simulate each fault condition to determine if any new paths for the set of source-destination pairs is caused by the fault condition, and to determine one or more performance measures corresponding to each new path, and
the report generator is configured to provide one or more reports based on the performance measures of the new paths.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
11. The method of
12. The method of
13. The method of
14. The method of
15. The method of
16. The method of
18. The method of
19. The method of
21. The system of
22. The system of
23. The system of
24. The system of
25. The system of
26. The system of
27. The system of
28. The system of
29. The system of
30. The system of
31. The system of
32. The system of
33. The system of
34. The system of
35. The system of
37. The system of
38. The system of
40. The medium of
|
This application claims the benefit of U.S. Provisional Patent Application 60/968,024, filed 24 Aug. 2007.
This invention relates to the field of network analysis, and in particular to a method and system for assessing the survivability of a network under a variety of fault conditions.
Network simulators are commonly used to assess the effects of changes to an existing network. Proposed additional equipment to the network can be simulated on a model of the network to determine whether the addition achieves the intended goals; possible additional traffic demands can be simulated to determine the degradation of service that can be expected; modified configurations can be simulated to determine whether the modification improves or degrades the network's performance; and so on. In each of these scenarios, models of the traffic being handled, or expected to be handled, are used to simulate the operation of the network with the given traffic.
Network simulators are also commonly used to perform survivability analysis, to determine how well the network performs when faults occur. For such an analysis, the traffic models are simulated on the network model in a fault-free condition to establish a performance baseline, then the network model is modified to represent a given fault, and the same simulation is performed to determine the degradation in performance, if any, caused by the fault. In the presence of a fault, traffic on the network is automatically re-routed as required and as feasible, which will generally increase the length of the route between affected nodes, and causing the load at the nodes and links along the re-routed path to increase, which increases the level of congestion and consequential delays on other routes.
This process is repeated for each of a variety of hypothesized fault conditions, and the performance under each fault condition is recorded. By assessing the performance of the network under a variety of fault conditions, faults that produce substantial performance degradation can be identified, and measures taken to modify the system to reduce such degradations and thereby enhance the system's ability to perform satisfactorily should such a fault actually occur.
The simulation of modeled traffic on large network models generally consumes a substantial amount of time, and the repeated simulations for each hypothesized fault condition for a survivability analysis is very often infeasible. Also, because the testing of hypothesized fault conditions cannot be exhaustive, particularly in large networks, conventional fault analysis methods generally include a random selection of fault conditions to simulate, and/or require the user to specifically identify each particular fault conditions of interest.
Additionally, it is often the case that traffic models are not available and/or difficult to obtain. Network models are often used to perform ‘reachability’ analyses, to verify that the nodes in the network are able to communicate with each other, without regard to the actual traffic loads, and/or to perform security analyses, to verify that any communication restrictions are enforced by the elements of the modeled network. In these situations, without traffic models, conventional survivability analysis cannot be performed.
It would be advantageous to be able to perform survivability analysis without incurring the time demands of conventional network simulations. It would also be advantageous to be able to perform survivability analysis without requiring traffic models. It would also be advantageous to allow for targeted survivability analysis within large networks.
These advantages, and others, can be realized by providing a method and system that determines the first-order effects of fault conditions by propagating discrete test packets between select nodes and noting the path taken by the test packet under normal and faulted conditions. Tools are provided to create classes of node pairs of interest, and test packets are created only for select classes. The network is analyzed to identify fault conditions that are likely to impact system performance, and only these fault conditions are simulated. By providing a methodology for selecting classes of node pairs to test, and prioritizing the faults to simulate, a first-order survivability analysis of large networks can be performed efficiently and effectively. The efficiency of this technique is also enhanced by providing test packets that are representative of a wide range of possible source-destination combinations.
The invention is explained in further detail, and by way of example, with reference to the accompanying drawings wherein:
Throughout the drawings, the same reference numerals indicate similar or corresponding features or functions. The drawings are included for illustrative purposes and are not intended to limit the scope of the invention.
In the following description, for purposes of explanation rather than limitation, specific details are set forth such as the particular architecture, interfaces, techniques, etc., in order to provide a thorough understanding of the concepts of the invention. However, it will be apparent to those skilled in the art that the present invention may be practiced in other embodiments, which depart from these specific details. In like manner, the text of this description is directed to the example embodiments as illustrated in the Figures, and is not intended to limit the claimed invention beyond the limits expressly included in the claims. For purposes of simplicity and clarity, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
This invention is premised on the observation that attempting to perform an exhaustive survivability analysis on large networks using models of the traffic on the network is generally infeasible, and a random selection of fault conditions to model is rarely effective for determining where improvements to the network are required. As an alternative to simulating the network using traffic models that imitate the variety of traffic flows across the network to determining the variety of effects caused by a fault condition, each route of interest is evaluated substantially independently to estimate/determine the ‘first-order’ effects of the fault condition. As used in this disclosure, a first-order effect of a fault is a change of routing path between nodes. That is, as contrast to traffic-based simulations of faults, which determines the change of routing and the consequential affects of these changes, the inventors have recognized that a substantial amount of information can be obtained regarding the robustness of the network, and the nodes or links that should be improved, by assessing the change of routing, without regard to the details of how a particular change of routing affects other nodes, and without regard to the details of the particular flows across the links.
By determining a change of routing, a number of key performance parameters can be determined/estimated. Of particular note, a change of routing may introduce additional routing or switching nodes (hops) along the path between the source and destination, which could be indicative of potential performance degradation. In like manner, the cumulative delay along the new path can be estimated, based on the nominal delay parameters associated with each node and link along the path. Additionally, as routes are changed, the number of routes that use any given link can change, and a large number of routes on a link can be indicative of an over utilization of that link.
Although not as detailed or as precise as an assessment based on actual flows through the network, these first-order effects of an increased number of hops and/or an increased delay across a route between two interfaces and/or an increased utilization of a link, have been found to be particularly well suited for assessing a network's survivability and identifying areas that are likely candidates for improving the network's survivability, and are determinable based only on a determination of the change of routing incurred by each failure condition.
This invention is also premised on the observation that, in many cases, a network manager can identify classes of communication interfaces of interest, such as only IP-capable interfaces, or only interfaces that include tunnels, and so on, depending upon the particular network, or the particular problem being addressed. In these situations, it would be preferable to determine the survivability of the network with regard to these select classes, and eliminate the assessment of survivability with regard to classes of no interest to the current analysis.
In like manner, although specific traffic flows are not used to determine the effects of each fault, heuristics can be applied to determine which nodes or links are more likely to impact the network's performance than others, such as links that support multiple routing paths, links related to the aforementioned interface classes of interest, and so on, to provide a more meaningful analysis than a random selection of nodes or links to fail.
Further, it is observed that once the interfaces to be tested and fault conditions to be modeled are determined, individual test packets can be created to efficiently determine the effect of each fault on communications to/from each selected interface without simulating the actual traffic flow through the network, and without simulating each source-destination combination associated with the interfaces of interest.
At 130, interface-pairs are generated, including an identification of each unique source-destination combination within the range of addresses of each interface in the pair.
At 140, a test packet is generated for each source-destination pair.
At 150, the fault-free routing between each unique source-destination combination is determined by propagating the test packet from the source to the destination. The path of each route is recorded for each source-destination pair, and is subsequently used to provide a selective simulation of only the pairs that are affected by each hypothesized fault condition. The first-order performance measures associated with each pair, based on the path of each route, such as the aforementioned number of hops along the path, and the cumulative delay along the path, are stored for the fault-free configuration, as a baseline.
At 160, the fault conditions that are to be simulated are generated, based on characteristics that are correlated to the likelihood of impacting performance if the fault occurs, such as the number of paths of interest that would be affected by the fault.
In the loop 170-179, each fault condition is modeled, and the effects of each fault on each selected source-destination pair is determined by noting any changes to the path taken under the fault condition. Based on the path, the first-order performance measures for each pair under each failure condition is determined and recorded.
At 180, the performance measures for each pair and each failure condition are compared to the performance measures recorded for the fault-free network, and corresponding statistics are determined.
At 190, these statistics, and underlying details, are presented to the user.
The following paragraphs detail example techniques for embodying each of the blocks of
At 110, the interfaces of interest are identified by providing options to a user. In addition to allowing the user to identify specific interfaces of interest, a preferred embodiment allows the user to define ‘classes’ of interfaces. Two classes of interest that appear to be effective for survivability analysis of typical large networks are: all IP-nodes in a network, and all edge nodes of a network. Predefined and custom-designed rules can be defined for identifying membership in each class. For example, because edge nodes are not typically expressly identified in network configuration files or corresponding network models, a heuristic rule, such as a rule based on the number of connected links on a node, can be used to classify a node as an edge node, and the threshold number of connected links can be defined by each user.
At 120, the selection/classification of these interfaces is optionally refined. For example, rules can be defined to identify which interface(s) on the nodes in the class is the default interface for assessment, such as the “loopback” interface. In like manner, other classes and sub-classes may be defined, as detailed further below.
At 130, interface-pairs are generated, including an identification of each unique source-destination combination within the range of addresses of each interface in the pair. In most cases, a full mesh of the interfaces in the select class(es) defines the set of communicating interface-pairs, although the user is provided the option of selecting particular interface pairs. In a preferred embodiment, the user may predefine common classes of interfaces, then selectively include or exclude sets of interface pairs for a particular analysis.
Also illustrated in
Also illustrated in the interface of
Having defined the sets of interface-pairs of interest, with optional further refinements as discussed above, these sets of interface-pairs are assessed to determine whether the addresses associated with each interface-pair are distinguished with regard to access policies or rights. That is, for example, in assessing the interface beginning with “176.16” at a given node, there are 2^16 different IP addresses (176.16.0.0 through 176.16.255.255) and 2^32 different port addresses associated with this defined interface, and the testing of all of these different addresses individually would be infeasible. However, if the routing of any one of these particular addresses is indistinguishable from the routing of any other particular address associated with this defined interface, the determination of a new path for a single address of the interface under a fault condition will define the routing effects caused by the fault to all the addresses of the defined interface. Conversely, if some of the addresses within the defined interface have different communication rights on the network, they may be routed differently, and should be distinguished from the other addresses.
In a preferred embodiment of this invention, each address-range of an interface that is subject to one or more different rules than another address-range at the interface is identified, and these distinguished address-ranges are used to generate the set of source-destination pairs that are subsequently included for testing under each fault condition. Copending USPA 2007/0282981, “AGGREGATING POLICY CRITERIA PARAMETERS INTO RANGES FOR EFFICIENT NETWORK ANALYSIS”, filed 15 Apr. 2007 for Alain J. Cohen, Pradeep K. Singh, Ankit Agarwal, and Venuprakash Barathan, teaches techniques for creating sets of source-destination pairs based on communication access policies, and is incorporated by reference herein. In this copending application, the entirety of the address space associated with an interface is assessed to determine all of the sets of distinguished addresses; in this application, only the address space defined by the user's refinements of the selected interface classes need be assessed.
By distinguishing the address range to define each source-address pair based on communication access policies/rights, the propagation of a message with a single address within the determined range of the pair will necessarily undergo the same access restrictions as any other address within the range. Accordingly, the testing of a single address within the range of a given source-address pair will be sufficient for testing all of the addresses associated with that source-address pair.
At 140, a test packet is generated for each distinguished source-destination pair. This test packet will generally contain the same header information that a packet in the actual network would contain, so that the routing elements that determine the path of the packet in the network model will perform the same actions based on this information as the actual network would perform on an actual packet. Additionally, this test packet may contain other information to facilitate the survivability analysis. For example, the test packet may include a nominal packet size, to facilitate a determination of bandwidth-related delays along the route. In like manner, although this technique does not address the details of traffic flow over time, the test packet may include a nominal traffic load per unit time, and the elements in the network model can be configured to accumulate the load from all of the test packets that are handled by the element. In this manner, although the test packets only represent the traffic of the selected interface-pairs, a relative measure of traffic load at each network element can be estimated.
At 150, the fault-free routing between each unique source-destination combination is determined by propagating the test packet from the source to the destination. In addition to determining the aforementioned first-order performance measures associated with the fault-free network to use a baseline, the path of each fault-free route for each source-destination pair is recorded. As discussed further below, by knowing the fault-free path of each source-destination pair, when a fault condition is imposed at a node or link, only the source-destination pairs whose paths include the faulted node or link need to be re-simulated to determine the effects of the fault. Additionally, as discussed below, the accumulated utilization of each element of the network during this fault-free simulation of these test packets is recorded. If the test packets include nominal loads, the utilization would include the total load of each element, otherwise, the utilization may only include the number of source-destination paths traversing the element.
At 160, the fault conditions that are to be simulated are determined, preferably based on characteristics that are correlated to the likelihood of impacting performance if the fault occurs. For example, it can be reasonably assumed that the elements of the network that are most heavily utilized under fault-free conditions are likely to be the elements whose failure will cause the most impact. In a preferred embodiment, the user is given the option of creating a given number of fault conditions based on the aforementioned accumulated utilization of each element of the network. Alternatively, or additionally, the user can identify particular types of elements to be included or excluded from the generated set of fault conditions, such as links, nodes, interfaces, as well as select combinations of elements.
In the loop 170-179, each fault condition is modeled and its effect on each source-destination pair is determined.
As noted above, the fault free path of each source-destination pair is recorded when each test packet is propagated from source to destination, identifying each element lying along the path. This information is transformed to define, for each fault condition, all of the source-destination pairs whose path traverses the faulted element(s). That is, if the fault condition is a failed link, all of the source-destination pairs whose fault-free paths include the failed link are identified. If the fault condition is a failed router, all of the source-destination pairs whose fault-free paths include any interface on the failed router are identified.
The loop 172-177 determines the effect of the given fault condition on each of the identified source-destination pairs that can be affected by the fault. At 174, the test packet associated with the source-destination pair is propagated to determine the new path for this pair caused by the fault condition, and at 175, the first-order performance measures associated with this new path are determined and recorded if they differ from the fault-free baseline, at 176. Optionally, the new path may also be recorded to provide such information upon request by the user in the report-generation phase.
At 180, the recorded performance measures for each pair and each failure condition are compared to the performance measures recorded for the fault-free network, and corresponding statistics are determined. In a preferred embodiment of this invention, the user is provided the option of defining the types of failure effects that are considered significant. If a given source-destination pair does not experience a significant failure effect for a given fault condition, that pair is considered unaffected by the fault condition. In this manner, the statistics that describe the results of the survivability analysis need not include source-destination pairs that are unaffected by each fault condition.
In this example, the quantitative criteria are specified with respect to the fault-free baseline performance measures. Defining the criteria as a percentage over the baseline is generally preferred, because the baseline delay and/or hop count of the fault-free routes generally reflects what is expected and tolerable. An increase of a particular amount of delay, for example, may be more tolerable in a route that generally has a long delay than in a route that generally has a short delay. In this manner, the criteria identify measures that are abnormal, rather than merely large.
The third criterion is used to identify violations to specified security policies. If communications are not permitted between a given source-destination pair, but a fault condition at a device that had been blocking this communication allows them to communicate, this is a violation of the security policy. Faults that prevent devices that are permitted to communicate from communicating are also included within this performance category, although these communication failures could be segregated from the aforementioned undesirable communication ‘successes’.
In a preferred embodiment, the pairs that are affected for each failure condition are recorded for subsequent report generation, with the corresponding performance measures for that failure condition.
One of skill in the art will recognize that the above described user specified thresholding and enabling may be performed when the performance measures are first determined, at 175, and only the measures that are significant enough to affect the source-destination pair are recorded at 176. In the preferred embodiment, recording all of the performance measures that differ from the baseline at 176 increases the amount of storage used, but allows the user to vary the thresholds and enablements for different reports without having to repeat the time-consuming process of 170-179.
Based on the above determinations of which source-destination pairs are affected by each failure condition, a number of statistics can be generated. The following statistics have been found to be particularly useful for assessing survivability and identifying problem areas.
Statistics related to source-destination pairs:
Statistics related to fault conditions:
At 190 of
In a preferred embodiment, the user is provided options for customizing the presentation of the results of the survivability analysis. A particularly useful option includes allowing the user to define “groups” of source-destination pairs.
By grouping selected source-destination pairs using some user-defined criteria, their performance as a group can be viewed. For example, all of the source-destination pairs associated with a given pair of nodes, or a given pair of geographic sites, can be grouped, and statistics generated for the group. Preferably, all of the statistics related to individual source-destination pairs, discussed above, will be determined for each individual group across all fault conditions.
In addition to allowing the user to define groups, in a preferred embodiment, a set of ‘standard’ groups are available for selection by the user, including grouping by site, by VPN, by ports/applications, and so on.
In a preferred embodiment, the user is provided the option of defining criteria to be applied to determine whether a group is ‘affected’ by each fault condition. For example, a group can be considered affected if a specified percentage of the pairs within the group are affected, and/or if a specified percentage of the pairs within the group experience communication failures, and so on.
The grouping of source-destination pairs for reporting allows for the presentation of this data in variety of forms. For example, the delays and/or hop counts can be presented as a histogram, graph, and so on, for any given group, where the user can select specific groups of interest.
Of particular note, in a typical survivability analysis, the number of source-destination pairs will be very large, whereas the number of groups will be much smaller, allowing the information to be better perceived and appreciated by the user.
A network model 410 describes the elements and topology of the network being analyzed. In accordance with one aspect of this invention, the user identifies interfaces of interest, and a source-destination pair generator 420 defines each distinguishable source-destination address range and selects a source-destination pair within each range. For each distinguished source-destination pair, a test packet generator 450 generates a packet for propagation from the source to the destination via a network simulator 460.
In accordance with another aspect of this invention, a fault-condition generator 430 identifies fault conditions that are likely to have a significant effect on the performance of the interfaces of interest, based, for example, on a simulation of the test packets for each source-destination pair. The fault-condition generator 430 is configured to modify the network model to represent each selected fault condition for simulation.
The simulator 460 is configured to propagate the test packets from source to destination under each selected fault condition. As detailed above, the simulator 460 is configured to simulate only the test packets of source-destination pairs that are able to be directly affected by the fault condition being modeled, and records any changes to performance measures of each pair under the fault condition relative to the fault-free condition.
A report generator 470 processes the results of the simulation to provide select survivability reports to the user. As discussed above, in a preferred embodiment, the user is provided the option of defining fault-induced performance effects that are considered significant enough for reporting, and is able to define groups of source-destination pairs to customize the reports for particular analyses.
The above describes the advantages that can be gained by selecting particular interface-pairs of interest and particular failure conditions of interest. Even with such selection, however, a typical survivability analysis of a large network can be expected to include hundreds or thousands of source-destination pairs and hundreds of failure conditions. As such, a variety of memory-saving, and/or computation-saving techniques are preferably used.
If the path used by each source-destination pair for each fault condition is recorded directly, an exorbitant amount of storage would be required. It is noted that for a given source-destination pair, the number of alternative routes is generally limited, as the same path may be used under many failure conditions. The amount of data required to store a path is substantially larger than the amount of data required to store an identification of the path. Therefore, in a preferred embodiment, each unique path that is generated is stored, and an equivalence class of all of the fault conditions that cause a source-destination pair to take that route is maintained. Further, the packet-independent performance measures are stored with each route, so that these measures do not need to be recomputed each time the source-destination pair is caused to take the route.
In a further extension of this concept, it is noted that the above equivalence class for each baseline path for each source-destination pair will contain all of the fault conditions that do not affect the source-destination pair. In a preferred embodiment, if a fault condition results in no change to the baseline path, that fault condition is not explicitly stored in the equivalence class. During the reporting phase, if a fault condition is not found in any equivalence class for a given source-destination pair, it is known to be an absent member of the baseline equivalence class, using the path and having the performance measures of the baseline path.
In another extension of this concept, it is noted that source-destination pairs that are associated with the same interface pair, but having different IP or port address ranges, are generally routed along the same route, except when the factor that distinguishes these source-destination pairs comes into play. For example, one range of interface-pair addresses (one source-destination pair) may be permitted to communicate, whereas another range of addresses of the interface-pair (another source-destination pair) may be prohibited from communication. The enforcement of the prohibitive communication policy may be located at an edge router to a local network, all of the other nodes along the paths being unaware of the policy. In this case, the routes from the source to this edge router will be equivalent for both source-destination pairs. By maintaining an equivalence class that includes both source-destination pairs, a single set of paths can be used for both pairs for all failure conditions that do not distinguish between the addresses of the pairs.
In each of the above optimizations, no information is lost between the exhaustive storage of each path of each source-destination pair for each fault condition. Other storage optimizations can be used if less information is acceptable. For example, as discussed above, if the particular path that each source-destination pair uses under each fault condition is of minor or no interest, significant storage savings can be achieved by only storing the performance measures; and also only storing the performance measures that are different from the baseline, or only storing the performance measures that exceed user-defined criteria.
Further savings can be achieved if the association of which fault condition caused which performance measure is of little or no interest. In this case, the performance data can be recorded as an aggregate. In the extreme case, the source-destination pair need only record the number of times it was affected by a fault condition, and/or the fault condition need only record the number of source-destination pairs that it affected. In another case, the source destination pair can record a histogram regarding the number of hops, or ranges of cumulative delay, incurred by each fault condition. In like manner, a running average of the cumulative delay incurred by each fault condition can be recorded. These and other techniques for minimizing storage requirements by recording only the information of interest will be apparent to one of skill in the art in view of this disclosure.
The foregoing merely illustrates the principles of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements which, although not explicitly described or shown herein, embody the principles of the invention and are thus within the spirit and scope of the following claims.
In interpreting these claims, it should be understood that:
a) the word “comprising” does not exclude the presence of other elements or acts than those listed in a given claim;
b) the word “a” or “an” preceding an element does not exclude the presence of a plurality of such elements;
c) any reference signs in the claims do not limit their scope;
d) several “means” may be represented by the same item or hardware or software implemented structure or function;
e) each of the disclosed elements may be comprised of hardware portions (e.g., including discrete and integrated electronic circuitry), software portions (e.g., computer programming), and any combination thereof;
f) hardware portions may be comprised of one or both of analog and digital portions;
g) any of the disclosed devices or portions thereof may be combined together or separated into further portions unless specifically stated otherwise;
h) no specific sequence of acts is intended to be required unless specifically indicated; and
i) the term “plurality of” an element includes two or more of the claimed element, and does not imply any particular range of number of elements; that is, a plurality of elements can be as few as two elements, and can include an immeasurable number of elements.
Singh, Pradeep K., Pasupathy, Arun, Cohen, Alain J., Vankov, Vanko, Jeyachandran, Vinod, Cao, Yonghuan
Patent | Priority | Assignee | Title |
11108619, | Jan 18 2017 | HUAWEI TECHNOLOGIES CO , LTD | Service survivability analysis method and apparatus |
8473616, | Sep 20 2007 | TELEFONAKTIEBOLAGET L M ERICSSON PUBL | Locator coding in a communications networks |
9800490, | Jul 29 2014 | Hewlett Packard Enterprise Development LP | Testing by simulation using variations of real-time traffic |
Patent | Priority | Assignee | Title |
5809282, | Jun 07 1995 | GRC INTERNATIONAL, INC | Automated network simulation and optimization system |
6570867, | Apr 09 1999 | RPX CLEARINGHOUSE LLC | Routes and paths management |
6654803, | Jun 30 1999 | RPX CLEARINGHOUSE LLC | Multi-panel route monitoring graphical user interface, system and method |
20030061017, | |||
20040073655, | |||
20040122645, | |||
20050073961, | |||
20070025355, | |||
20080040088, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Aug 18 2008 | VANKOV, VANKO | OPNET Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021419 | /0771 | |
Aug 18 2008 | CAO, YONGHUAN | OPNET Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021419 | /0771 | |
Aug 18 2008 | COHEN, ALAIN J | OPNET Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021419 | /0771 | |
Aug 18 2008 | SINGH, PRADEEP K | OPNET Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021419 | /0771 | |
Aug 18 2008 | JEYACHANDRAN, VINOD | OPNET Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021419 | /0771 | |
Aug 18 2008 | PASUPATHY, ARUN | OPNET Technologies, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 021419 | /0771 | |
Aug 20 2008 | Opnet Technologies, Inc. | (assignment on the face of the patent) | / | |||
Dec 18 2012 | OPNET Technologies, Inc | MORGAN STANLEY & CO LLC | SECURITY AGREEMENT | 029646 | /0060 | |
Dec 18 2012 | RIVERBED TECHNOLOGY, INC | MORGAN STANLEY & CO LLC | SECURITY AGREEMENT | 029646 | /0060 | |
Apr 01 2013 | OPNET Technologies, Inc | OPNET TECHNOLOGIES LLC | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 030411 | /0290 | |
Apr 01 2013 | OPNET TECHNOLOGIES LLC | RIVERBED TECHNOLOGY, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 030462 | /0148 | |
Dec 20 2013 | RIVERBED TECHNOLOGY, INC | JPMORGAN CHASE BANK, N A , AS ADMINISTRATIVE AGENT | PATENT SECURITY AGREEMENT | 032421 | /0162 | |
Dec 20 2013 | MORGAN STANLEY & CO LLC, AS COLLATERAL AGENT | RIVERBED TECHNOLOGY, INC | RELEASE OF PATENT SECURITY INTEREST | 032113 | /0425 | |
Apr 24 2015 | JPMORGAN CHASE BANK, N A | RIVERBED TECHNOLOGY, INC | CORRECTIVE ASSIGNMENT TO CORRECT THE CONVEYING PARTY NAME PREVIOUSLY RECORDED ON REEL 035521 FRAME 0069 ASSIGNOR S HEREBY CONFIRMS THE RELEASE OF SECURITY INTEREST IN PATENTS | 035807 | /0680 | |
Apr 24 2015 | RIVERBED TECHNOLOGY, INC | MORGAN STANLEY SENIOR FUNDING, INC , AS COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 035561 | /0363 | |
Apr 24 2015 | BARCLAYS BANK PLC | RIVERBED TECHNOLOGY, INC | RELEASE OF SECURITY INTEREST IN PATENTS | 035521 | /0069 | |
Dec 31 2020 | RIVERBED TECHNOLOGY, INC | ALTER DOMUS US LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT | 055514 | /0249 | |
Apr 20 2021 | RIVERBED TECHNOLOGY, INC | MACQUARIE CAPITAL FUNDING LLC | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 056397 | /0750 | |
Apr 20 2021 | ATERNITY LLC | MACQUARIE CAPITAL FUNDING LLC | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 056397 | /0750 | |
Apr 20 2021 | RIVERBED HOLDINGS, INC | MACQUARIE CAPITAL FUNDING LLC | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 056397 | /0750 | |
Oct 12 2021 | MACQUARIE CAPITAL FUNDING LLC | ATERNITY LLC | RELEASE OF SECURITY INTEREST IN PATENTS RECORED AT REEL 056397, FRAME 0750 | 057983 | /0356 | |
Oct 12 2021 | MACQUARIE CAPITAL FUNDING LLC | RIVERBED TECHNOLOGY, INC | RELEASE OF SECURITY INTEREST IN PATENTS RECORED AT REEL 056397, FRAME 0750 | 057983 | /0356 | |
Oct 12 2021 | MACQUARIE CAPITAL FUNDING LLC | RIVERBED HOLDINGS, INC | RELEASE OF SECURITY INTEREST IN PATENTS RECORED AT REEL 056397, FRAME 0750 | 057983 | /0356 | |
Oct 13 2021 | ATERNITY LLC | WILMINGTON TRUST, NATIONAL ASSOCIATION | PATENT SECURITY AGREEMENT | 057943 | /0386 | |
Oct 13 2021 | RIVERBED TECHNOLOGY, INC | WILMINGTON TRUST, NATIONAL ASSOCIATION | PATENT SECURITY AGREEMENT | 057943 | /0386 | |
Oct 13 2021 | ATERNITY LLC | ALTER DOMUS US LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT SUPPLEMENT - SECOND LIEN | 057810 | /0559 | |
Oct 13 2021 | RIVERBED TECHNOLOGY, INC | ALTER DOMUS US LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT SUPPLEMENT - SECOND LIEN | 057810 | /0559 | |
Oct 13 2021 | RIVERBED HOLDINGS, INC | ALTER DOMUS US LLC, AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT SUPPLEMENT - SECOND LIEN | 057810 | /0559 | |
Oct 13 2021 | ATERNITY LLC | MORGAN STANLEY SENIOR FUNDING, INC , AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT SUPPLEMENT - FIRST LIEN | 057810 | /0502 | |
Oct 13 2021 | RIVERBED TECHNOLOGY, INC | MORGAN STANLEY SENIOR FUNDING, INC , AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT SUPPLEMENT - FIRST LIEN | 057810 | /0502 | |
Oct 13 2021 | RIVERBED HOLDINGS, INC | MORGAN STANLEY SENIOR FUNDING, INC , AS COLLATERAL AGENT | PATENT SECURITY AGREEMENT SUPPLEMENT - FIRST LIEN | 057810 | /0502 | |
Dec 07 2021 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS U S COLLATERAL AGENT | ATERNITY LLC | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 058593 | /0169 | |
Dec 07 2021 | RIVERBED TECHNOLOGY, INC | RIVERBED TECHNOLOGY LLC | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 059232 | /0551 | |
Dec 07 2021 | ALTER DOMUS US LLC, AS COLLATERAL AGENT | RIVERBED TECHNOLOGY, INC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 064673 | /0739 | |
Dec 07 2021 | ALTER DOMUS US LLC, AS COLLATERAL AGENT | ATERNITY LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 064673 | /0739 | |
Dec 07 2021 | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS U S COLLATERAL AGENT | RIVERBED TECHNOLOGY, INC | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 058593 | /0169 | |
Dec 07 2021 | ALTER DOMUS US LLC, AS COLLATERAL AGENT | ATERNITY LLC | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 058593 | /0108 | |
Dec 07 2021 | ALTER DOMUS US LLC, AS COLLATERAL AGENT | RIVERBED TECHNOLOGY, INC | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 058593 | /0108 | |
Dec 07 2021 | MORGAN STANLEY SENIOR FUNDING, INC , AS COLLATERAL AGENT | ATERNITY LLC | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 058593 | /0046 | |
Dec 07 2021 | MORGAN STANLEY SENIOR FUNDING, INC , AS COLLATERAL AGENT | RIVERBED TECHNOLOGY, INC | TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 058593 | /0046 | |
Dec 07 2021 | ATERNITY LLC | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS U S COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 058486 | /0216 | |
Dec 07 2021 | RIVERBED TECHNOLOGY LLC FORMERLY RIVERBED TECHNOLOGY, INC | WILMINGTON TRUST, NATIONAL ASSOCIATION, AS U S COLLATERAL AGENT | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 058486 | /0216 | |
Dec 07 2021 | ALTER DOMUS US LLC, AS COLLATERAL AGENT | RIVERBED HOLDINGS, INC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 064673 | /0739 |
Date | Maintenance Fee Events |
Oct 17 2013 | ASPN: Payor Number Assigned. |
Apr 25 2014 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
May 02 2018 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
May 12 2022 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Nov 30 2013 | 4 years fee payment window open |
May 30 2014 | 6 months grace period start (w surcharge) |
Nov 30 2014 | patent expiry (for year 4) |
Nov 30 2016 | 2 years to revive unintentionally abandoned end. (for year 4) |
Nov 30 2017 | 8 years fee payment window open |
May 30 2018 | 6 months grace period start (w surcharge) |
Nov 30 2018 | patent expiry (for year 8) |
Nov 30 2020 | 2 years to revive unintentionally abandoned end. (for year 8) |
Nov 30 2021 | 12 years fee payment window open |
May 30 2022 | 6 months grace period start (w surcharge) |
Nov 30 2022 | patent expiry (for year 12) |
Nov 30 2024 | 2 years to revive unintentionally abandoned end. (for year 12) |